The Associated Press becomes the latest news organization attempting to distance themselves from the ‘Vast 2016 Russian Election Conspiracy Theory’ narrative, otherwise known as ‘muh Russia’.  [LINK]

Obviously posting their “clarification” over six months of Fake News citations, late on a Friday night leading into a holiday weekend shows the slyness of the creeping toward the exit.  Nothing to see here folks, move along, move along; pay no attention to the creepy journalists hugging the walls slinking off… nothing to see here.

This latest AP walk-back follows on the heels of the New York Times exit a few days ago.

Both corrections reference a Russian Election Interference Joint Analysis Report, widely called the “Russian Intelligence Report”, which has been falsely used by most media to frame a narrative that 17 agencies within the U.S. intelligence community agreed that Russia attempted to interfere with the U.S. election.

It is not coincidental the two most politicized intelligence operatives, John Brennan (CIA) and James Comey (FBI), presented the information along with like-minded political traveler ODNI James Clapper. While Admiral Mike Rogers (NSA) is also included in the report authorship, it is largely -and intentionally- overlooked that Rogers only held a “moderate confidence” in the overall report finding. It was Brennan and Comey who claimed “high confidence” in the report content.

We have continually pointed out at the time the report was written it appeared to be entirely political in construct. The intent of the report was to provide source material for the overall Russian conspiracy narrative; and also establish some framework for the White House to take action, vis-a-vis sanctions.

Against the backdrop of the December 2016 sanctions announcement, President Obama’s administration released the Joint Analysis Report claiming it outlined details of Russia’s involvement hacking into targeted political data-base or computer systems during the election.

Except it didn’t

Not even a little.

The “Russian Malicious Cyber Activity – Joint Analysis Report” (full pdf below) was/is pure nonsense. It outlines nothing more than vague and disingenuous typical hacking activity that is no more substantive than any other hacking report on any other foreign actor.

This might as well be a report blaming Nigerian fraud phone solicitors for targeting U.S. phone numbers. Just because you didn’t actually win the Nigerian national lottery doesn’t mean the Nigerian government are targeting you for your portion of the lottery revenue.

The December FBI report was/is, well, quite simply, pure horse-pucky.

What the report does well is using ridiculous technical terminology to describe innocuous common activity. Example: “ATPT29” is Olaf, the round faced chubby guy probably working from his kitchen table; and “ATPT28” is his unemployed socially isolated buddy living in Mom’s basement down the street.

This paragraph below is priceless in it’s humorous and disingenuous gobblespeak:

Both groups have historically targeted government organizations, think tanks, universities, and corporations around the world. APT29 has been observed crafting targeted spearphishing campaigns leveraging web links to a malicious dropper; once executed, the code delivers Remote Access Tools (RATs) and evades detection using a range of techniques.

APT28 is known for leveraging domains that closely mimic those of targeted organizations and tricking potential victims into entering legitimate credentials. APT28 actors relied heavily on shortened URLs in their spearphishing email campaigns. Once APT28 and APT29 have access to victims, both groups exfiltrate and analyze information to gain intelligence value.

These groups use this information to craft highly targeted spearphishing campaigns. These actors set up operational infrastructure to obfuscate their source infrastructure, host domains and malware for targeting organizations, establish command and control nodes, and harvest credentials and other valuable information from their targets.

(*note the emphasis I placed in the quote) All that nonsense is saying is a general explanation for how hacking, any hacking, is generally carried out. The entire FBI report was nothing more than a generalized, albeit techno-worded, explanation for how Nigerians, Indians, or in this case Russians, attempt to gain your email passwords etc., nothing more.

Here’s the “report“:

[scribd id=335307016 key=key-qvjYK3gLD9WdgOskmgoe mode=scroll]

What was alarming to consider was: A) how far the various radical leftists were willing to go to create a straw man crisis for political benefit; and B) how diminished the executive office of the U.S. presidency actually became amid this level of ridiculous propaganda.

There’s no doubt the intended outcome was to create internal confusion amid the U.S. electorate, and seed a media narrative. There were/are millions of people who bought into these widely discussed fabrications.

Consider the example inside a Yahoo News article showcasing the report:

[…] The US intelligence community has concluded that a hack-and-release of Democratic Party and Clinton staff emails was designed to put Trump — a political neophyte who has praised Putin — into the Oval Office. (link)

There was no evidence the DNC was “hacked” (WikiLeaks claims the information was an inside job of “leaking”), Hillary Clinton blames the Macedonians, and even John Podesta admitted himself he was a victim of an ordinary “phishing” password change scam. Not exactly a “hack” per se’.

Does hacking exist, of course it does. Do hackers exist in every country connected by the internet, of course they do. Do state governments participate in hacking offense and defense, again – yes, of course they do. And yes, the FBI and U.S. intelligence community act purposefully against all participants they can catch.

But what does that intellectual truism have to do with the specific allegation that hostile Russian hackers attempted to gain entry into the DNC or John Podesta? These are two entirely different issues which the Obama administration (Brennan and Comey) attempted to conflate simply for political and ideological purposes.

Here is where we see the overall intended and conflated outcome. Consider the Yaho0 media paragraph above against the headline which accompanied the content:

afp-yahoo-tweet-2

There’s a reasonable case to be made that all of those previous political players have quite a bit to hide within the construct of the entire narrative. Some like James Comey, and possibly Susan Rice, appear to have violated laws on leaking information and unmasking U.S. citizens within intelligence reports.

Former CIA Director John Brennan has clearly established his own exit from the risk matrix. While former ODNI James Clapper is almost too inept to be held accountable for any of it.

It would be disingenuous in the extreme to ignore that NSA Director Mike Rogers was the least willing and least engaged intelligence leader within the scheme and simultaneously highly political ODNI James Clapper was calling for him to be fired.

Admiral Mike Rogers traveled to Trump Tower (after the election) on Friday November 11th without notifying the White House or Clapper. The next day, November 12th, President-Elect Trump moved the entire Transition Team to his New Jersey country club.

Admiral Mike Rogers remains the current head of the NSA.

Share